996 resultados para incident response
Resumo:
Texas Department of Transportation, Austin
Resumo:
Postprint
Resumo:
Nel mondo della sicurezza informatica, le tecnologie si evolvono per far fronte alle minacce. Non è possibile prescindere dalla prevenzione, ma occorre accettare il fatto che nessuna barriera risulterà impenetrabile e che la rilevazione, unitamente ad una pronta risposta, rappresenta una linea estremamente critica di difesa, ma l’unica veramente attuabile per poter guadagnare più tempo possibile o per limitare i danni. Introdurremo quindi un nuovo modello operativo composto da procedure capaci di affrontare le nuove sfide che il malware costantemente offre e allo stesso tempo di sollevare i comparti IT da attività onerose e sempre più complesse, ottimizzandone il processo di comunicazione e di risposta.
Resumo:
Shipping list no.: 2004-0092-P.
Resumo:
In case of a major incident or disaster, the advance medical rescue command needs to manage several essential tasks simultaneously. These include the rapid deployment of ambulance, police, fire and evacuation services, and their coordinated activity, as well as triage and emergency medical care on site. The structure of such a medical rescue command is crucial for the successful outcome of medical evacuation at major incidents. However, little data has been published on the nature and structure of the command itself. This study presents a flexible approach to command structure, with two command heads: one emergency physician and one experienced paramedic. This approach is especially suitable for Switzerland, whose federal system allows for different structures in each canton. This article examines the development of these structures and their efficiency, adaptability and limitations with respect to major incident response in the French-speaking part of the country.
Resumo:
Abstract: Big Data has been characterised as a great economic opportunity and a massive threat to privacy. Both may be correct: the same technology can indeed be used in ways that are highly beneficial and those that are ethically intolerable, maybe even simultaneously. Using examples of how Big Data might be used in education - normally referred to as "learning analytics" - the seminar will discuss possible ethical and legal frameworks for Big Data, and how these might guide the development of technologies, processes and policies that can deliver the benefits of Big Data without the nightmares. Speaker Biography: Andrew Cormack is Chief Regulatory Adviser, Jisc Technologies. He joined the company in 1999 as head of the JANET-CERT and EuroCERT incident response teams. In his current role he concentrates on the security, policy and regulatory issues around the network and services that Janet provides to its customer universities and colleges. Previously he worked for Cardiff University running web and email services, and for NERC's Shipboard Computer Group. He has degrees in Mathematics, Humanities and Law.
Resumo:
L'obiettivo di questo lavoro è quello di fornire una metodologia operativa, esposta sotto forma di modello organizzativo strutturato per casi, che le aziende possono utilizzare per definire le azioni immediate di risposta da intraprendere al verificarsi di un evento informatico di sicurezza, che potrebbe trasformarsi, come vedremo, in incidente informatico di sicurezza. La strutturazione di questo modello si basa principalmente su due standard prodotti dall'ISO/IEC ed appartenenti alla famiglia 27000, che delinea il sistema di gestione della sicurezza delle informazioni in azienda e che ha come scopo principale la protezione di riservatezza, integrità e disponibilità dei dati in azienda. Il contenuto di tali standard non può però prescindere dagli ordinamenti giuridici di ogni paese in cui vengono applicati, motivo per cui all'interno del lavoro sono stati integrati i riferimenti alle normative di rilevante interesse, soprattutto quelle collegate alla privacy e ai casi presi in esame all'interno del modello sviluppato. In prima battuta vengono quindi introdotti gli standard di riferimento, illustrati all'interno del Capitolo 1, proseguendo poi con la descrizione di concetti fondamentali per la strutturazione del modello organizzativo, come sicurezza informatica, incident response e informatica forense, che vengono esposti nel Capitolo 2. Nel Capitolo 3 vengono invece descritti gli aspetti normativi in merito alla privacy dei dati aziendali, dettagliando anche le motivazioni che portano alla creazione del modello organizzativo obiettivo di questo lavoro. Nel Capitolo 4 viene illustrato il modello organizzativo proposto, che presenta una struttra per casi e contiene una analisi dei casi più rilevanti dal punto di vista del business aziendale. Infine, nel Capitolo 5 vengono descritte le caratteristiche e le funzionalità di un software sviluppato sotto forma di Windows Service, nato in seguito a delle considerazioni basate sulle analisi di rischio svolte nel Capitolo 4.
Resumo:
On December 21, 2015, Governor Branstad issued Executive Order 87 (EO87); a cybersecurity initiative for the State of Iowa. The executive order establishes a multi-agency partnership, the EO87 Leadership Team, with the Office of the Chief Information Officer, Iowa National Guard, Department of Public Safety, Iowa Communications Network, and the Iowa Homeland Security and Emergency Management Department. The order directs these agencies to develop a comprehensive cybersecurity strategy which addresses lifeline critical infrastructure, risk assessments, best practices, awareness training, public education and communication, collaboration, K-12 and higher education, data breach notifications, and incident response planning to protect the citizens of Iowa and Iowa businesses. The EO87 Leadership Team, along with several key partners, worked diligently over the last six months to prepare recommendations that will have a direct and sustainable impact on protecting lifeline critical infra-structure, reducing risk to government operations, and creating sustainable partnerships in cybersecurity.
Resumo:
A Guidebook for First Responders During the Initial Phase of a Dangerous Goods/Hazardous Materials Transportation Incident.
Resumo:
[EN] This work studies the structure-soil-structure interaction (SSSI) effects on the dynamic response of nearby piled structures under obliquely-incident shear waves. For this purpose, a three-dimensional, frequency-domain, coupled boundary element-finite (BEM-FEM) model is used to analyse the response of configuration of three buildings aligned parallel to the horizontal component of the wave propagation direction.
Resumo:
Power systems are planed and operated according to the optimization of the available resources. Traditionally these tasks were mostly undertaken in a centralized way which is no longer adequate in a competitive environment. Demand response can play a very relevant role in this context but adequate tools to negotiate this kind of resources are required. This paper presents an approach to deal with these issues, by using a multi-agent simulator able to model demand side players and simulate their strategic behavior. The paper includes an illustrative case study that considers an incident situation. The distribution company is able to reduce load curtailment due to load flexibility contracts previously established with demand side players.
Resumo:
Demand response can play a very relevant role in the context of power systems with an intensive use of distributed energy resources, from which renewable intermittent sources are a significant part. More active consumers participation can help improving the system reliability and decrease or defer the required investments. Demand response adequate use and management is even more important in competitive electricity markets. However, experience shows difficulties to make demand response be adequately used in this context, showing the need of research work in this area. The most important difficulties seem to be caused by inadequate business models and by inadequate demand response programs management. This paper contributes to developing methodologies and a computational infrastructure able to provide the involved players with adequate decision support on demand response programs and contracts design and use. The presented work uses DemSi, a demand response simulator that has been developed by the authors to simulate demand response actions and programs, which includes realistic power system simulation. It includes an optimization module for the application of demand response programs and contracts using deterministic and metaheuristic approaches. The proposed methodology is an important improvement in the simulator while providing adequate tools for demand response programs adoption by the involved players. A machine learning method based on clustering and classification techniques, resulting in a rule base concerning DR programs and contracts use, is also used. A case study concerning the use of demand response in an incident situation is presented.
Resumo:
Background. In cardiopulmonary bypass (CPB) patients, fibrinolysis may enhance postoperative inflammatory response. We aimed to determine whether an additional postoperative dose of antifibrinolytic tranexamic acid (TA) reduced CPB-mediated inflammatory response (IR). Methods. We performed a randomized, double-blind, dose-dependent, parallel-groups study of elective CPB patients receiving TA. Patients were randomly assigned to either the single-dose group (40 mg/Kg TA before CPB and placebo after CPB) or the double-dose group (40 mg/Kg TA before and after CPB). Results. 160 patients were included, 80 in each group. The incident rate of IR was significantly lower in the double-dose-group TA2 (7.5% vs. 18.8% in the single-dose group TA1; P = 0.030). After adjusting for hypertension, total protamine dose and temperature after CPB, TA2 showed a lower risk of IR compared with TA1 [OR: 0.29 (95% CI: 0.10-0.83), (P = 0.013)]. Relative risk for IR was 2.5 for TA1 (95% CI: 1.02 to 6.12). The double-dose group had significantly lower chest tube bleeding at 24 hours [671 (95% CI 549-793 vs. 826 (95% CI 704-949) mL; P = 0.01 corrected-P significant] and lower D-dimer levels at 24 hours [489 (95% CI 437-540) vs. 621(95% CI: 563-679) ng/mL; P = 0.01 corrected-P significant]. TA2 required lower levels of norepinephrine at 24 h [0.06 (95% CI: 0.03-0.09) vs. 0.20(95 CI: 0.05-0.35) after adjusting for dobutamine [F = 6.6; P = 0.014 corrected-P significant]. We found a significant direct relationship between IL-6 and temperature (rho = 0.26; P < 0.01), D-dimer (rho = 0.24; P < 0.01), norepinephrine (rho = 0.33; P < 0.01), troponin I (rho = 0.37; P < 0.01), Creatine-Kinase (rho = 0.37; P < 0.01), Creatine Kinase-MB (rho = 0.33; P < 0.01) and lactic acid (rho = 0.46; P < 0.01) at ICU arrival. Two patients (1.3%) had seizure, 3 patients (1.9%) had stroke, 14 (8.8%) had acute kidney failure, 7 (4.4%) needed dialysis, 3 (1.9%) suffered myocardial infarction and 9 (5.6%) patients died. We found no significant differences between groups regarding these events. Conclusions. Prolonged inhibition of fibrinolysis, using an additional postoperative dose of tranexamic acid reduces inflammatory response and postoperative bleeding (but not transfusion requirements) in CPB patients. A question which remains unanswered is whether the dose used was ideal in terms of safety, but not in terms of effectiveness.
Resumo:
The State of Iowa has adopted a multi-hazard approach to managing the consequences of emergency/disaster response. Underlying this approach is the principle that a standard set of generic functional capabilities can be employed to effectively address a wide variety of hazardous conditions and categories of incidents, whether these have a known probability of occurring or are totally unforeseen. Therefore, to the greatest extent possible, the activities described and assigned in this plan are organized along functional lines first, rather than by agency, type of hazard, or type of incident. Contained in this section of the Plan, known as the ―Basic Plan,‖ are instructions, policies, and explanatory information related to many or all of the agencies/entities involved in emergency/ disaster response, as well as information about the legal and administrative foundations for the Plan, the state’s characteristics and significant hazards, lines of succession for the state’s chief executive, plan activation requirements, and the structure of the response organization.